ByÂ Shaun Waterman-The Washington Times
Two security researchers, working at home in their spare time, have created a cyberweapon similar to the sophisticated Stuxnet computer worm that was discovered last year to have disrupted computer systems runningÂ Iranâ€™s nuclear program.
The private efforts byÂ Dillon Beresford andÂ Brian Meixell are raising concerns amongÂ U.S. government officials that hackers will launch copycat cyber-attacks that could cripple computer controls at industrial sites such as refineries, dams and power plants.
Officials at the Department of Homeland Security were so distressed by the researchersâ€™ findings that they asked the two men to cancel a planned presentation at a computer security conference in Dallas last week called TakeDownCon.
â€œThey requested that I not share the data, but it was absolutely my decision to cancel,â€Â Mr. Beresford told The Washington Times. Homeland Security â€œin no way tried to censor the presentation, and the conference organizers were very supportive. â€¦ We did the right thing.â€
Initial analysis of the 2009 Stuxnet attack onÂ Iran suggested that replicating it would require the resources of a nation-state or large organization and detailed information on how the target computer system was set up. The origin of Stuxnet has not been discovered.
ButÂ Mr. Beresford said he developed the cyberweapon â€œin my bedroom, on my laptopâ€ in 2 1/2 months. The malicious software, or malware, was tested on equipment made byÂ Siemens, the German-based industrial giant that makes the system that was attacked by the Stuxnet worm.
Siemens products – known as industrial control systems – are used in thousands of power stations, chemical plants and other industrial settings worldwide. Stuxnet was designed to make the machinery controlled by an industrial control system destroy itself.
OnceÂ Siemens sawÂ Mr. Beresfordâ€™s presentation, the company renewed laboratory work on software patches for controllers that were developed after Stuxnet,Â Mr. Beresford said. He said he worked last week with officials from a special Homeland Security unit in charge of protecting industrial computer programs but was becoming impatient withÂ Siemensâ€˜ response.
â€œThis is another egregious example of a vendor trying to minimize the impact of multiple security vulnerabilities in their products and being somewhat evasive about the truth,â€ he said, noting that the company tried to downplay concern in its public statements and had yet to publish a fix for the flaws he had found.
â€œThe clock is ticking, and time is of the essence. I expect more from a company worth $80 billion, and so do [their] customers,â€Â Mr. Beresfordsaid.
Siemens spokesman Robert Bartels told The Times that the company is testing fixes and expects to release them â€œwithin the next few weeks.â€
Homeland Security Department officials asked the researchers to delay their presentation until special repair measures aimed at patching security holes they identified are fully developed. They praised the researchers for postponing public release of data that hackers could use to attack computers that control critical infrastructure around the world.
â€œResponsible disclosure â€¦ does not encourage the release of sensitive vulnerability information without also validating and releasing a solution,â€ a Homeland Security official said in an email.
To read more, visit:Â http://www.washingtontimes.com/news/2011/may/24/homemade-cyberweapon-worries-feds/
Don’t let the MSM censor your news as America becomes Great Again. Over 500,000 Americans receive our daily dose of life, liberty and pursuit of happiness along with Breaking News direct to their inbox—and you can too. Sign up to receive news and views from The 1776Coalition!
We know how important your privacy is and your information is SAFE with us. We’ll never sell
your email address and you can unsubscribe at any time directly from your inbox.